Claim Missing Document
Check
Articles

Found 1 Documents
Search
Journal : J-SAKTI (Jurnal Sains Komputer dan Informatika)

Penyandian File Word Berdasarkan Algoritma Rivest Code 5 (RC5) Widodo Arif Prabowo; Annisa Fitri Harahap; Ridha Ismadiah
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 2, No 1 (2018): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (641.849 KB) | DOI: 10.30645/j-sakti.v2i1.55

Abstract

Nowadays, important data in the form of word files have been widely used. But there are still few who apply security techniques to the important files. Files that are confidential or important, if they fall into the hands of others may be misused or manipulated for certain purposes. The existence of document security applications built on cryptographic algorithms is one solution to solve the above problems. Cryptographic techniques secure a data or important files by encoding the data into a cipher that is difficult to understand again by others. The RC5 algorithm is one of the cryptographic technique algorithms that can be used to encode text from word files based on the RC5 algorithm so that it can improve the expression of important and confidential word files.